1. EachPod

CyberSecurity Summary - Podcast

CyberSecurity Summary

CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity.
Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity.
Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your understanding and keep you informed.

You can listen and download our episodes for free on more than 10 different platforms:
https://linktr.ee/cyber_security_summary

Education News Arts Books Tech News
Update frequency
every day
Average duration
24 minutes
Episodes
1010
Years Active
2024 - 2025
Share to:
MSSQL Penetration Testing - Metasploit

MSSQL Penetration Testing - Metasploit

The provided Book is a guide on how to use Metasploit to penetrate and test Microsoft SQL Server (MSSQL) databases. The guide covers various steps, beginning with locating MSSQL servers on a network …
00:12:14  |   Thu 09 Jan 2025
MCSA Guide to Installing and Configuring Microsoft Windows Server 2012 /R2, Exam 70-410

MCSA Guide to Installing and Configuring Microsoft Windows Server 2012 /R2, Exam 70-410

The Book  provide a comprehensive guide to installing, configuring, and managing Microsoft Windows Server 2012/R2. The text covers a wide range of topics including server installation, storage config…
00:25:01  |   Thu 09 Jan 2025
Microsoft Security Operations Analyst Exam Ref SC-200 Certification Guide: Manage, monitor, and respond to threats using Microsoft Security

Microsoft Security Operations Analyst Exam Ref SC-200 Certification Guide: Manage, monitor, and respond to threats using Microsoft Security

The Book  is an excerpt from a certification guidebook intended for individuals seeking to become Microsoft Security Operations Analysts. The guidebook focuses on the Microsoft Security Stack, which …
00:10:18  |   Thu 09 Jan 2025
ModSecurity Handbook

ModSecurity Handbook

The Book is a manual for ModSecurity, an open-source web application firewall. The manual covers a wide range of topics, including installation, configuration, rule writing, persistent storage, and a…
00:30:33  |   Wed 08 Jan 2025
Modern System Administration: Managing Reliable and Sustainable Systems

Modern System Administration: Managing Reliable and Sustainable Systems

This Book titled Modern System Administration: Building and Maintaining Reliable Systems, explores the evolving role of system administrators in the context of modern, cloud-based computing. The auth…
00:08:04  |   Wed 08 Jan 2025
Modern Full-Stack Development: Using TypeScript, React, Node.js, Webpack, and Docker

Modern Full-Stack Development: Using TypeScript, React, Node.js, Webpack, and Docker

The provided Book "Modern Full-Stack Development Using TypeScript, React, Node.js," which aims to guide readers through building web applications using modern technologies. The book begins by introdu…
00:25:00  |   Wed 08 Jan 2025
Modern DevOps Practices: Implement and secure DevOps in the public cloud with cutting-edge tools, tips, tricks, and techniques

Modern DevOps Practices: Implement and secure DevOps in the public cloud with cutting-edge tools, tips, tricks, and techniques

The Book is a comprehensive guide to modern DevOps practices, focusing on containerization, Kubernetes, and various tools like Docker, Terraform, Ansible, Packer, Spinnaker, and Flux CD. It provides …
00:14:50  |   Wed 08 Jan 2025
Modern Cybersecurity Practices: Exploring And Implementing Agile Cybersecurity Frameworks and Strategies for Your Organization

Modern Cybersecurity Practices: Exploring And Implementing Agile Cybersecurity Frameworks and Strategies for Your Organization

The provided Book "Modern Cybersecurity Practices," which is a guide to exploring and implementing agile cybersecurity frameworks and strategies within an organization. The book utilizes a real-world…
00:15:28  |   Wed 08 Jan 2025
Mobile Deep Learning with TensorFlow Lite, ML Kit and Flutter

Mobile Deep Learning with TensorFlow Lite, ML Kit and Flutter

The provided Book excerpts come from the book "Mobile Deep Learning with TensorFlow Lite, ML Kit, and Flutter," offering a comprehensive guide to integrating deep learning within mobile applications.…
00:19:47  |   Tue 07 Jan 2025
Mining Social Media: Finding Stories in Internet Data

Mining Social Media: Finding Stories in Internet Data

This Book, Mining Social Media: Finding Stories in Internet Data, by Lam Thuy Vo, is a guide for journalists and others interested in analyzing social media data. It teaches readers how to collect an…
00:37:58  |   Tue 07 Jan 2025
Minimizing and Exploiting Leakage in VLSI Design

Minimizing and Exploiting Leakage in VLSI Design

This Book focuses on minimizing leakage power consumption in VLSI design. The authors examine leakage currents and their impact on circuit performance, especially in the context of scaling down trans…
00:15:06  |   Tue 07 Jan 2025
Mike Meyers' CompTIA Network+ Guide to Managing and Troubleshooting Networks, Sixth Edition

Mike Meyers' CompTIA Network+ Guide to Managing and Troubleshooting Networks, Sixth Edition

This Book excerpt is a guide to managing and troubleshooting networks, specifically using the CompTIA Network+ certification exam as a guide. It covers the basics of networking, including physical la…
00:09:01  |   Mon 06 Jan 2025
Migrating Linux to Microsoft Azure: A hands-on guide to efficiently relocating your Linux workload to Azure

Migrating Linux to Microsoft Azure: A hands-on guide to efficiently relocating your Linux workload to Azure

This Book excerpt detailing the process of migrating Linux workloads to Microsoft Azure. The book outlines the four main phases of migration: Assess, Migrate, Optimize, and Manage and Secure, providi…
00:24:59  |   Mon 06 Jan 2025
Microsoft 365 Security Administration: MS-500 Exam Guide

Microsoft 365 Security Administration: MS-500 Exam Guide

This Book is a guide to Microsoft 365 security administration, specifically focusing on the MS-500 exam. It details how to plan and implement security and compliance strategies within a Microsoft 365…
00:11:39  |   Mon 06 Jan 2025
Microsoft Security, Compliance, and Identity Fundamentals Exam Ref SC-900

Microsoft Security, Compliance, and Identity Fundamentals Exam Ref SC-900

This Book provides a comprehensive overview of Microsoft's security, compliance, and identity fundamentals. It explores industry-standard security concepts, including defense-in-depth and zero-trust,…
00:12:39  |   Mon 06 Jan 2025
Microsoft Information Protection Administrator SC-400 Certification Guide: Advance your Microsoft Security & Compliance services knowledge

Microsoft Information Protection Administrator SC-400 Certification Guide: Advance your Microsoft Security & Compliance services knowledge

This Book is a comprehensive guide for individuals preparing to take the Microsoft Information Protection Administrator Associate (SC-400) exam. It provides an overview of Microsoft Information Prote…
00:12:50  |   Sun 05 Jan 2025
Microsoft Identity and Access Administrator Exam Guide: Implement IAM solutions with Azure AD, build an identity governance strategy

Microsoft Identity and Access Administrator Exam Guide: Implement IAM solutions with Azure AD, build an identity governance strategy

The Microsoft Identity and Access Administrator Exam Guide, written by Dwayne Natwick and reviewed by industry experts, offers a comprehensive guide to implementing Identity and Access Management (IA…
00:14:12  |   Sun 05 Jan 2025
Microprocessor 5: Software and Hardware Aspects of Development, Debugging and Testing - The Microcomputer

Microprocessor 5: Software and Hardware Aspects of Development, Debugging and Testing - The Microcomputer

The source Book provides a detailed overview of microprocessor systems, covering their software and hardware aspects. It examines topics such as assembly language, debugging and testing techniques, d…
00:25:51  |   Sun 05 Jan 2025
Microprocessor 2: Communication in a Digital System

Microprocessor 2: Communication in a Digital System

The first source, "Microprocessor 2: Core Concepts ─ Communication in a Digital System" by Philippe Darche, is a detailed technical guide exploring various aspects of microprocessor communication wit…
00:22:17  |   Sun 05 Jan 2025
Microprocessor 1: Prolegomena - Calculation and Storage Functions - Models of Computation and Computer Architecture

Microprocessor 1: Prolegomena - Calculation and Storage Functions - Models of Computation and Computer Architecture

The Book focusing on the microprocessor, a key component in modern computers. The first volume in the series introduces foundational concepts related to computation, storage, and computer architectur…
00:19:02  |   Sat 04 Jan 2025
Disclaimer: The podcast and artwork embedded on this page are the property of CyberSecurity Summary. This content is not affiliated with or endorsed by eachpod.com.